botnet zero- day IoT identity theft BEC breach DDoS risk spyware social engineering Cyber Security WISP VPN hacker smishing FTP Defense- in-depth encryption antivirus resilience confidentiality network escalation security awareness OS pentest PHI business continuity IP worm availability IDS insider threat IPS risk assessment bug vulnerability defense evasion IOC vishing incident malware integrity incident response cyber attack PII exploit passphrase HIPAA password Dark Web spoofing firewall compliance phishing security policy CIA triad packet training cryptography virus spam MFA admin Proofpoint rootkit Security Operations APT Cyber Defense SyssecAdmin ransomware EDR botnet zero- day IoT identity theft BEC breach DDoS risk spyware social engineering Cyber Security WISP VPN hacker smishing FTP Defense- in-depth encryption antivirus resilience confidentiality network escalation security awareness OS pentest PHI business continuity IP worm availability IDS insider threat IPS risk assessment bug vulnerability defense evasion IOC vishing incident malware integrity incident response cyber attack PII exploit passphrase HIPAA password Dark Web spoofing firewall compliance phishing security policy CIA triad packet training cryptography virus spam MFA admin Proofpoint rootkit Security Operations APT Cyber Defense SyssecAdmin ransomware EDR
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
botnet
zero-day
IoT
identity theft
BEC
breach
DDoS
risk
spyware
social engineering
Cyber Security
WISP
VPN
hacker
smishing
FTP
Defense-in-depth
encryption
antivirus
resilience
confidentiality
network
escalation
security awareness
OS
pentest
PHI
business continuity
IP
worm
availability
IDS
insider threat
IPS
risk assessment
bug
vulnerability
defense evasion
IOC
vishing
incident
malware
integrity
incident response
cyber attack
PII
exploit
passphrase
HIPAA
password
Dark Web
spoofing
firewall
compliance
phishing
security policy
CIA triad
packet
training
cryptography
virus
spam
MFA
admin
Proofpoint
rootkit
Security Operations
APT
Cyber Defense
SyssecAdmin
ransomware
EDR